Skip to content

ail-project/ail-feeder-apk

Folders and files

NameName
Last commit message
Last commit date

Latest commit

 

History

17 Commits
 
 
 
 
 
 
 
 
 
 
 
 
 
 

Repository files navigation

ail-feeder-apk

This AIL feeder pushes annotated APK to an AIL instance for yara detection.

Concepts and Workflow

It goes something like this:

flowchart TD
    scraping_play_store --> id1
    id1-->downloading--> id4
    id1-->analysis_baselining
    id4-->analysis_baselining --> id3
    analysis_baselining --> id5
    id4-->analysis_hunting --> id2
    id1-->analysis_hunting
    id5-->id6
    id2-->ail-feeder-apk-->id6
    id1[(scrap)]
    id2[(hunt)]
    id3[(baseline)]
    id5[(images.bloom)]
    id4[(raccoon)]
    id6[(AIL)]
Loading
  1. fill out etc/ail-feeder-apk.cfg to define which keywords to search for, what developper certificates are trusted, AIL credentials, raccoon installation, etc.
  2. use bin/scrap_playstore.py to scrap the applications on the playstore that correspond to your keywords - the results are placed into the scrap lmdb,
  3. use bin/download_apks.py to download/update all the .apk files through raccoon - the resulting files are placed in raccoon home folder,
  4. use bin/analysis.py baselining to create the baseline - the resulting bloom filter is images.bloom by default, and a baseline lmdb,
  5. use bin/analysis.py hunting to create the hunt lmdb,
  6. use bin/feeder-apk.py to push the content of the hunt lmdb to the AIL instance.
  7. The AIL instance receive json annotation regarding the APK, and run the corresponding YARA rules against these files.

for instance:

import "androguard"

rule andro_fleur
{
    condition:
        androguard.image(0) == 1
}
  1. bin/analysis.py hunting <some.apk> can be used to add an local apk file to the hunt lmdb.

Requirements

This feeder has several requirements for the AIL instances to treat its input correctly:

Remarks and Future Works

  • At the moment the tool produces way too many false positive androfleur should return a match count instead of success/failure. This would allow for yara rules to trigger only above a threashold.
  • databases of known files could be queried (or their filters) to filter out false positives.
  • the tool could mine playstore comments and score for threat detection.
  • additional an dex decompilation step can produce intereseting detection means.

Acknowledgment

The project has been co-funded by CEF-TC-2020-2 - 2020-EU-IA-0260 - JTAN - Joint Threat Analysis Network.

About

This AIL feeder pushes annotated APK to an AIL instance

Resources

License

Stars

Watchers

Forks

Releases

No releases published

Packages

No packages published

Languages